🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 ZIP Vulnerabilities

Directory Traversal, Zip Bombs, Archive Security, Format Exploitation

Weaponizing AI Assistants: With Their Permission
cryptologie.net·1d
⚡Proof Automation
Digitally Syndicated Book Reviews
cyberb.space·1d
📡RSS Readers
Legal Ransomware
aardvark.co.nz·4d
🏴‍☠️Piracy
BSD Now 620: Postmortem for jemalloc
discoverbsd.com·3d
🔌Operating system internals
XSLT: A Precision Tool for the Future of Structured Transformation
xml.com·5h·
Discuss: Hacker News
📋Document Grammar
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.biz·5d
🔓Hacking
How I write docs quickly
passo.uno·55m·
Discuss: Hacker News
⚡Proof Automation
Acquire-By-Hash for APT packages repositories, and the lack of it in Kali Linux
arnaudr.io·4d·
Discuss: Hacker News
❄️Nixpkgs
Ship Your Directory in 1-Hour with DirEasy Boilerplate
direasy.com·2d·
Discuss: Hacker News
🔍BitFunnel
KDE Plasma 6.5 Introduces Long-Awaited Rounded Bottom Corners
linuxiac.com·1d
🕸️WASM Archives
Hackers can bypass FIDO MFA keys, putting your accounts at risk - here's what we know
techradar.com·15m
🔓Hacking
I’ve created a web tool to batch add update dates at the beginning of filenames
dev.to·13h·
Discuss: DEV
🤖Archive Automation
US government agencies are under attack in widespread Microsoft hack
the-independent.com·26m
🔓Hacking
Python Fundamentals: class variables
dev.to·2h·
Discuss: DEV
🐛Fuzzing
Linux and Secure Boot certificate expiration
lwn.net·2d·
Discuss: Lobsters, Hacker News
🔒Secure Boot
JOVE – Jonathan’s Own Version of Emacs (1983)
github.com·4d·
Discuss: Hacker News
📺VT100 Emulation
Remembering Chiptunes, the Demoscene and the Illegal Music of Keygens
hackaday.com·12h
📼Cassette Culture
What people said about an OpenZFS bug
despairlabs.com·4d·
Discuss: Lobsters, Hacker News
🔒Type Safety
Gunter: Your Go-To for Quick IP and Domain Insights
dev.to·4h·
Discuss: DEV
📡DNS Archaeology
A beginner's guide to the Background-Remover model by 851-Labs on Replicate
dev.to·13h·
Discuss: DEV
🔓Reverse engineering
Loading...Loading more...
AboutBlogChangelogRoadmap